Cyber Posture

CVE-2025-70161

CriticalPublic PoC

Published: 09 January 2026

Published
09 January 2026
Modified
22 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0056 68.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName…

more

field, allowing arbitrary code execution.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validating information inputs like the pppUserName field at web interfaces to prevent command injection by ensuring proper sanitization before passing to system() calls.

preventrecover

SI-2 mandates identifying, documenting, and remediating flaws such as the unsanitized pppUserName handling in the Web-setWAN handler to eliminate the command injection vulnerability.

detectrespond

RA-5 requires vulnerability scanning that would identify the command injection vulnerability in the router firmware and trigger remediation actions.

Security SummaryAI

CVE-2025-70161, published on 2026-01-09, is a command injection vulnerability (CWE-77) affecting the EDIMAX BR-6208AC V2_1.02 router firmware. The issue stems from the pppUserName field being directly passed to a shell command via the system() function in the Web-setWAN handler without proper sanitization, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction by injecting malicious commands into the pppUserName field during WAN configuration attempts. Successful exploitation enables arbitrary code execution on the affected device, potentially granting full control over the router.

Mitigation details are available in the advisory published at https://tzh00203.notion.site/EDIMAX-BR-6208AC-V2_1-02-Command-Injection-Vulnerability-in-Web-setWAN-handler-2d3b5c52018a80d7ae8dce2bf5e3294c?source=copy_link.

Details

CWE(s)

Affected Products

edimax
br-6208ac firmware
1.03

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated remote command injection via public-facing web WAN configuration handler enables exploitation of public-facing application (T1190) and arbitrary Unix shell command execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References